{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:24:06Z","timestamp":1770751446967,"version":"3.50.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:00:00Z","timestamp":1770681600000},"content-version":"vor","delay-in-days":27,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00276-5","type":"journal-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T05:45:06Z","timestamp":1768369506000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trustfed a scalable privacy preserving federated AI framework for industrial IoT healthcare and finance"],"prefix":"10.1007","volume":"6","author":[{"given":"Dileep Kumar","family":"Murala","sequence":"first","affiliation":[]},{"given":"K.","family":"Madhura","sequence":"additional","affiliation":[]},{"given":"Veera Ankalu","family":"Vuyyuru","sequence":"additional","affiliation":[]},{"given":"K. Vara Prasada","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Hitimana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,14]]},"reference":[{"key":"276_CR1","doi-asserted-by":"publisher","first-page":"28684","DOI":"10.1109\/ACCESS.2024.3367118","volume":"12","author":"A Alanhdi","year":"2024","unstructured":"Alanhdi A, Toka L. A survey on integrating edge computing with AI and blockchain in maritime domain, aerial systems, IoT, and industry 4.0. IEEE Access. 2024;12:28684\u2013709. https:\/\/doi.org\/10.1109\/ACCESS.2024.3367118.","journal-title":"IEEE Access"},{"key":"276_CR2","doi-asserted-by":"publisher","first-page":"69160","DOI":"10.1109\/ACCESS.2022.3186892","volume":"10","author":"OA Vision","year":"2022","unstructured":"Vision OA, et al. Blockchain for industry 5.0. Key Enable Future Direct IEEE Access. 2022;10:69160\u201399. https:\/\/doi.org\/10.1109\/ACCESS.2022.3186892.","journal-title":"Key Enable Future Direct IEEE Access"},{"key":"276_CR3","doi-asserted-by":"publisher","unstructured":"Pedrouzo-Ulloa A, et al, Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies, 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023:604-611, https:\/\/doi.org\/10.1109\/CSR57506.2023.10224961.","DOI":"10.1109\/CSR57506.2023.10224961"},{"key":"276_CR4","doi-asserted-by":"publisher","first-page":"108339","DOI":"10.1109\/ACCESS.2023.3317174","volume":"11","author":"B Pradhan","year":"2023","unstructured":"Pradhan B, Das S, Roy DS, Routray S, Benedetto F, Jhaveri RH. An AI-assisted smart healthcare system using 5G communication. IEEE Access. 2023;11:108339\u201355. https:\/\/doi.org\/10.1109\/ACCESS.2023.3317174.","journal-title":"IEEE Access"},{"key":"276_CR5","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/OJIA.2024.3399057","volume":"5","author":"C Trivedi","year":"2024","unstructured":"Trivedi C, et al. Explainable AI for industry 5.0: vision, architecture, and potential directions. IEEE Open J Indust Appl. 2024;5:177\u2013208. https:\/\/doi.org\/10.1109\/OJIA.2024.3399057.","journal-title":"IEEE Open J Indust Appl"},{"issue":"16","key":"276_CR6","doi-asserted-by":"publisher","first-page":"12806","DOI":"10.1109\/JIOT.2021.3072611","volume":"8","author":"DC Nguyen","year":"2021","unstructured":"Nguyen DC, et al. federated learning meets blockchain in edge computing: opportunities and challenges. IEEE Internet of Things J. 2021;8(16):12806\u201325. https:\/\/doi.org\/10.1109\/JIOT.2021.3072611.","journal-title":"IEEE Internet of Things J"},{"key":"276_CR7","doi-asserted-by":"publisher","first-page":"145747","DOI":"10.1109\/ACCESS.2023.3345360","volume":"11","author":"E Goh","year":"2023","unstructured":"Goh E, Kim D-Y, Lee K, Oh S, Chae J-E, Kim D-Y. Blockchain-enabled federated learning: a reference architecture design. Implement Verif IEEE Access. 2023;11:145747\u201362. https:\/\/doi.org\/10.1109\/ACCESS.2023.3345360.","journal-title":"Implement Verif IEEE Access"},{"key":"276_CR8","doi-asserted-by":"publisher","first-page":"97495","DOI":"10.1109\/ACCESS.2022.3204037","volume":"10","author":"EU Soykan","year":"2022","unstructured":"Soykan EU, Kara\u00e7ay L, Karako\u00e7 F, Tomur E. A survey and guideline on privacy enhancing technologies for collaborative machine learning. IEEE Access. 2022;10:97495\u2013519. https:\/\/doi.org\/10.1109\/ACCESS.2022.3204037.","journal-title":"IEEE Access"},{"key":"276_CR9","doi-asserted-by":"publisher","first-page":"120994","DOI":"10.1109\/ACCESS.2024.3451627","volume":"12","author":"F Naguji","year":"2024","unstructured":"Naguji F, et al. GreenLand: a secure land registration scheme for blockchain and ai-enabled agriculture industry 5.0. IEEE Access. 2024;12:120994\u20131009. https:\/\/doi.org\/10.1109\/ACCESS.2024.3451627.","journal-title":"IEEE Access"},{"issue":"5","key":"276_CR10","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1109\/TMECH.2020.3022983","volume":"25","author":"H Ding","year":"2020","unstructured":"Ding H, Gao RX, Isaksson AJ, Landers RG, Parisini T, Yuan Y. State of AI-based monitoring in smart manufacturing and introduction to focused section. IEEE\/ASME Trans Mechatron. 2020;25(5):2143\u201354. https:\/\/doi.org\/10.1109\/TMECH.2020.3022983.","journal-title":"IEEE\/ASME Trans Mechatron"},{"key":"276_CR11","doi-asserted-by":"publisher","first-page":"91357","DOI":"10.1109\/ACCESS.2024.3418995","volume":"12","author":"JS Yalli","year":"2024","unstructured":"Yalli JS, Hasan MH, Badawi AA. Internet of Things (IoT): origins, embedded technologies, smart applications, and its growth in the last decade. IEEE Access. 2024;12:91357\u201382. https:\/\/doi.org\/10.1109\/ACCESS.2024.3418995.","journal-title":"IEEE Access"},{"key":"276_CR12","doi-asserted-by":"publisher","first-page":"55419","DOI":"10.1109\/ACCESS.2018.2871724","volume":"6","author":"J Wan","year":"2018","unstructured":"Wan J, Yang J, Wang Z, Hua Q. Artificial intelligence for cloud-assisted smart factory. IEEE Access. 2018;6:55419\u201330. https:\/\/doi.org\/10.1109\/ACCESS.2018.2871724.","journal-title":"IEEE Access"},{"issue":"4","key":"276_CR13","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/JPROC.2020.3034808","volume":"109","author":"J Wan","year":"2021","unstructured":"Wan J, Li X, Dai H-N, Kusiak A, Mart\u00ednez-Garc\u00eda M, Li D. Artificial-intelligence-driven customized manufacturing factory: key technologies. Appl Chall Proc IEEE. 2021;109(4):377\u201398. https:\/\/doi.org\/10.1109\/JPROC.2020.3034808.","journal-title":"Appl Chall Proc IEEE"},{"issue":"16","key":"276_CR14","doi-asserted-by":"publisher","first-page":"14273","DOI":"10.1109\/JIOT.2020.3032706","volume":"9","author":"L Ouyang","year":"2022","unstructured":"Ouyang L, Yuan Y, Wang FY. Learning markets: an ai collaboration framework based on blockchain and smart contracts. IEEE Internet of Things J. 2022;9(16):14273\u201386. https:\/\/doi.org\/10.1109\/JIOT.2020.3032706.","journal-title":"IEEE Internet of Things J"},{"key":"276_CR15","doi-asserted-by":"publisher","first-page":"189891","DOI":"10.1109\/ACCESS.2020.3031599","volume":"8","author":"M Ahmad","year":"2020","unstructured":"Ahmad M, Abdullah M, Moon H, Yoo SJ, Han D. Image classification based on automatic neural architecture search using binary crow search algorithm. IEEE Access. 2020;8:189891\u2013912. https:\/\/doi.org\/10.1109\/ACCESS.2020.3031599.","journal-title":"IEEE Access"},{"key":"276_CR16","doi-asserted-by":"publisher","first-page":"34564","DOI":"10.1109\/ACCESS.2020.2975142","volume":"8","author":"M Gupta","year":"2020","unstructured":"Gupta M, Abdelsalam M, Khorsandroo S, Mittal S. Security and privacy in smart farming: challenges and opportunities. IEEE Access. 2020;8:34564\u201384. https:\/\/doi.org\/10.1109\/ACCESS.2020.2975142.","journal-title":"IEEE Access"},{"key":"276_CR17","doi-asserted-by":"publisher","first-page":"2577","DOI":"10.1109\/TIFS.2025.3539964","volume":"20","author":"M Xhemrishi","year":"2025","unstructured":"Xhemrishi M, \u00d6stman J, Wachter-Zeh A, Amat AGI. FedGT: identification of malicious clients in federated learning with secure aggregation. IEEE Trans Inform Forensics Secur. 2025;20:2577\u201392. https:\/\/doi.org\/10.1109\/TIFS.2025.3539964.","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"3","key":"276_CR18","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TBDATA.2024.3442534","volume":"11","author":"SO Hwang","year":"2025","unstructured":"Hwang SO. Moving conditional GAN close to data: synthetic tabular data generation and its experimental evaluation. IEEE Trans Big Data. 2025;11(3):1188\u2013205. https:\/\/doi.org\/10.1109\/TBDATA.2024.3442534.","journal-title":"IEEE Trans Big Data"},{"key":"276_CR19","doi-asserted-by":"publisher","first-page":"15532","DOI":"10.1038\/s41598-025-99267-3","volume":"15","author":"DK Murala","year":"2025","unstructured":"Murala DK, Loucif S, Rao KVP, et al. Enhancing smart contract security using a code representation and GAN based methodology. Sci Rep. 2025;15:15532. https:\/\/doi.org\/10.1038\/s41598-025-99267-3.","journal-title":"Sci Rep"},{"key":"276_CR20","doi-asserted-by":"publisher","first-page":"173989","DOI":"10.1109\/ACCESS.2019.2957019","volume":"7","author":"N Liu","year":"2019","unstructured":"Liu N, et al. Modeling and simulation of robot inverse dynamics using LSTM-based deep learning algorithm for smart cities and factories. IEEE Access. 2019;7:173989\u201398. https:\/\/doi.org\/10.1109\/ACCESS.2019.2957019.","journal-title":"IEEE Access"},{"key":"276_CR21","doi-asserted-by":"publisher","first-page":"102977","DOI":"10.1109\/ACCESS.2024.3432662","volume":"12","author":"N Patel","year":"2024","unstructured":"Patel N, et al. Fuzzy-enhanced secure messaging framework for smart healthcare system. IEEE Access. 2024;12:102977\u201393. https:\/\/doi.org\/10.1109\/ACCESS.2024.3432662.","journal-title":"IEEE Access"},{"issue":"3","key":"276_CR22","doi-asserted-by":"publisher","first-page":"4198","DOI":"10.1109\/TIA.2025.3536421","volume":"61","author":"Q An","year":"2025","unstructured":"An Q, et al. A blockchain-powered secure architecture for cyber marketplaces of electric vehicles. IEEE Trans Indust Appl. 2025;61(3):4198\u2013213. https:\/\/doi.org\/10.1109\/TIA.2025.3536421.","journal-title":"IEEE Trans Indust Appl"},{"issue":"10","key":"276_CR23","doi-asserted-by":"publisher","first-page":"1785","DOI":"10.1109\/JPROC.2020.2998530","volume":"108","author":"R Minerva","year":"2020","unstructured":"Minerva R, Lee GM, Crespi N. Digital twin in the IoT context: a survey on technical features. Scen Architec Models Proc IEEE. 2020;108(10):1785\u2013824. https:\/\/doi.org\/10.1109\/JPROC.2020.2998530.","journal-title":"Scen Architec Models Proc IEEE"},{"issue":"2","key":"276_CR24","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/JBHI.2022.3185418","volume":"27","author":"S Rachakonda","year":"2023","unstructured":"Rachakonda S, et al. Privacy enhancing and scalable federated learning to accelerate AI implementation in cross-silo and IoMT environments. IEEE J Biomed Health Inform. 2023;27(2):744\u201355. https:\/\/doi.org\/10.1109\/JBHI.2022.3185418.","journal-title":"IEEE J Biomed Health Inform"},{"key":"276_CR25","doi-asserted-by":"publisher","first-page":"68319","DOI":"10.1109\/ACCESS.2022.3184710","volume":"10","author":"T Singh","year":"2022","unstructured":"Singh T, Solanki A, Sharma SK, Nayyar A, Paul A. A decade review on smart cities: paradigms, challenges and opportunities. IEEE Access. 2022;10:68319\u201364. https:\/\/doi.org\/10.1109\/ACCESS.2022.3184710.","journal-title":"IEEE Access"},{"key":"276_CR26","doi-asserted-by":"publisher","first-page":"50296","DOI":"10.1109\/ACCESS.2025.3551750","volume":"13","author":"U Vm","year":"2025","unstructured":"Vm U, et al. AI-Powered IoT: a survey on integrating artificial intelligence with iot for enhanced security, efficiency, and smart applications. IEEE Access. 2025;13:50296\u2013339. https:\/\/doi.org\/10.1109\/ACCESS.2025.3551750.","journal-title":"IEEE Access"},{"issue":"7","key":"276_CR27","doi-asserted-by":"publisher","first-page":"7905","DOI":"10.1109\/TII.2022.3210597","volume":"19","author":"X Wang","year":"2023","unstructured":"Wang X, Hu J, Lin H, Liu W, Moon H, Piran MJ. Federated learning-empowered disease diagnosis mechanism in the internet of medical things: from the privacy-preservation perspective. IEEE Trans Industr Inf. 2023;19(7):7905\u201313. https:\/\/doi.org\/10.1109\/TII.2022.3210597.","journal-title":"IEEE Trans Industr Inf"},{"issue":"11","key":"276_CR28","doi-asserted-by":"publisher","first-page":"19143","DOI":"10.1109\/JIOT.2024.3367692","volume":"11","author":"Y Hu","year":"2024","unstructured":"Hu Y, et al. Industrial internet of things intelligence empowering smart manufacturing: a literature review. IEEE Internet of Things J. 2024;11(11):19143\u201367. https:\/\/doi.org\/10.1109\/JIOT.2024.3367692.","journal-title":"IEEE Internet of Things J"},{"issue":"5","key":"276_CR29","doi-asserted-by":"publisher","first-page":"5274","DOI":"10.1109\/JIOT.2024.3486121","volume":"12","author":"Y Liang","year":"2025","unstructured":"Liang Y, Chen Q, Jiang H. Joint resource optimization for federated edge learning with integrated sensing, communication, and computation. IEEE Internet of Things J. 2025;12(5):5274\u201388. https:\/\/doi.org\/10.1109\/JIOT.2024.3486121.","journal-title":"IEEE Internet of Things J"},{"key":"276_CR30","doi-asserted-by":"publisher","first-page":"15532","DOI":"10.1038\/s41598-025-99267-3","volume":"15","author":"DK Murala","year":"2025","unstructured":"Murala DK, Loucif S, Rao KVP, et al. Enhancing smart contract security using a code representation and GAN based methodology. Sci Rep. 2025;15:15532. https:\/\/doi.org\/10.1038\/s41598-025-99267-3.","journal-title":"Sci Rep"},{"issue":"4","key":"276_CR31","doi-asserted-by":"publisher","first-page":"2289","DOI":"10.1109\/JIOT.2020.3029138","volume":"8","author":"Y Miao","year":"2021","unstructured":"Miao Y, Song J, Wang H, Hu L, Hassan MM, Chen M. Smart Micro-GaS: a cognitive micro natural gas industrial ecosystem based on mixed blockchain and edge computing. IEEE Internet of Things J. 2021;8(4):2289\u201399. https:\/\/doi.org\/10.1109\/JIOT.2020.3029138.","journal-title":"IEEE Internet of Things J"},{"issue":"4","key":"276_CR32","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/LNET.2022.3200724","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta R, Saxena D, Gupta I, Makkar A, Singh AK. Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Netw Lett. 2022;4(4):174\u20138. https:\/\/doi.org\/10.1109\/LNET.2022.3200724.","journal-title":"IEEE Netw Lett"},{"issue":"4","key":"276_CR33","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/LNET.2022.3215248","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta R, Saxena D, Gupta I, Singh AK. Differential and TriPhase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Netw Lett. 2022;4(4):217\u201321. https:\/\/doi.org\/10.1109\/LNET.2022.3215248.","journal-title":"IEEE Netw Lett"},{"key":"276_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111519","author":"K Gupta","year":"2024","unstructured":"Gupta K, Saxena D, Gupta R, Kumar J, Singh AK. FedMUP: federated learning driven malicious user prediction model for secure data distribution in cloud environments. Appl Soft Comput. 2024. https:\/\/doi.org\/10.1016\/j.asoc.2024.111519.","journal-title":"Appl Soft Comput"},{"issue":"11","key":"276_CR35","doi-asserted-by":"publisher","first-page":"6815","DOI":"10.1109\/TSMC.2023.3288081","volume":"53","author":"D Saxena","year":"2023","unstructured":"Saxena D, Gupta I, Gupta R, Singh AK, Wen X. An AI-Driven VM threat prediction model for multi-risks analysis-based cloud cybersecurity. IEEE Trans Syst Man and Cybern Systs. 2023;53(11):6815\u201327. https:\/\/doi.org\/10.1109\/TSMC.2023.3288081.","journal-title":"IEEE Trans Syst Man and Cybern Systs"},{"key":"276_CR36","doi-asserted-by":"publisher","unstructured":"Morchid A, Oughannou Z, Khalid HM, Qjidaa H, El Alami R, Siano P, et al. 101704. ISSN. 2025;2542\u20136605. https:\/\/doi.org\/10.1016\/j.iot.2025.101704.","DOI":"10.1016\/j.iot.2025.101704"},{"key":"276_CR37","doi-asserted-by":"publisher","unstructured":"Morchid A, Muhammad IG, Alblushi HM, Khalid HQ, El Alami R, IoT I, et al. 101191. ISSN. 2025;2210\u20135379. https:\/\/doi.org\/10.1016\/j.suscom.2025.101191.","DOI":"10.1016\/j.suscom.2025.101191"},{"key":"276_CR38","doi-asserted-by":"publisher","unstructured":"Morchid A, Jebabra R, Alami RE, Charqi M, Boukili B. Smart Agriculture for Sustainability: The Implementation of Smart Irrigation Using Real-Time Embedded System Technology, 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), FEZ, Morocco, 2024;1-6. https:\/\/doi.org\/10.1109\/IRASET60544.2024.10548972.","DOI":"10.1109\/IRASET60544.2024.10548972"},{"key":"276_CR39","doi-asserted-by":"publisher","unstructured":"Abdennabi Morchid, Abdulla Ismail, Haris M. Khalid, Hassan Qjidaa, Rachid El Alami, Blockchain and IoT technologies in smart farming to enhance the efficiency of the agri-food supply chain: A review of applications, benefits, and challenges, Internet of Things, Volume 33. 101733. ISSN. 2025;2542\u20136605. https:\/\/doi.org\/10.1016\/j.iot.2025.101733.","DOI":"10.1016\/j.iot.2025.101733"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00276-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00276-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00276-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T11:16:46Z","timestamp":1770722206000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00276-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,14]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["276"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00276-5","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,14]]},"assertion":[{"value":"26 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study has no human participants, clinical data, or identifiable personal information, thus ethical approval is not needed. Not applicable. No participation consent was needed because the research involved no humans or personal data. Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Personal data, photos, and information are not included in the study. Therefore, publishing consent is unnecessary. Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"I declare that the authors have no competing interests that could influence the results or discussion of this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"13"}}